Secure two-party computation via cut-and-choose oblivious transfer
Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › peer-review
119
Scopus
citations